SOC Resources Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/resources/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Wed, 04 Sep 2024 05:04:46 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png SOC Resources Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/resources/ 32 32 Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM https://gbhackers.com/ids/ https://gbhackers.com/ids/#comments Sat, 01 Jul 2023 13:45:00 +0000 https://gbhackers.com/?p=690 An intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations. IDS also can be referred to as a packet sniffer which intercepts packets travel along with various communication mediums. All the packets are analyzed after they are captured. How IDS Works? The main purpose of […]

The post Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/ids/feed/ 6
Live Cyber Forensics Analysis with Computer Volatile Memory https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/ https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/#respond Sat, 01 Jul 2023 06:23:13 +0000 https://gbhackers.com/?p=9033 The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence). Forensics Analysis – Volatile Data: How to Collect Volatile Data: Acquisition of live Volatile Memory: Run the tool as an administrator and start the capture. Dump File […]

The post Live Cyber Forensics Analysis with Computer Volatile Memory appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/feed/ 0
SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC https://gbhackers.com/soc-defense-attack-chain/ https://gbhackers.com/soc-defense-attack-chain/#respond Mon, 26 Jun 2023 10:51:52 +0000 https://gbhackers.com/?p=27396 This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. Most times, cyber-attacks are getting executed in stages. So the SOC team must understand the attack patterns and the attack chain. So breaking the attack chain and averting the criminal’s intent to stop their […]

The post SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/soc-defense-attack-chain/feed/ 0
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide https://gbhackers.com/intrusion-prevention-system-architecture/ https://gbhackers.com/intrusion-prevention-system-architecture/#respond Wed, 07 Jun 2023 08:02:18 +0000 https://gbhackers.com/?p=2369 Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into Intrusion Prevention System architecture. An Intrusion Prevention System (IPS) is a framework that screens a network for evil exercises, for example, security dangers or policy compliance. Vulnerability exploits normally come in the form of malicious […]

The post Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/intrusion-prevention-system-architecture/feed/ 0
Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM https://gbhackers.com/intrusion-detection-system-ids-2/ https://gbhackers.com/intrusion-detection-system-ids-2/#comments Tue, 06 Jun 2023 07:09:00 +0000 https://gbhackers.com/?p=2360 An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities such as DDOS Attacks or security policy violations. An IDS works by monitoring system activity through examining vulnerabilities in the system, the integrity of files and […]

The post Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/intrusion-detection-system-ids-2/feed/ 3
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation https://gbhackers.com/soc-indicator/ https://gbhackers.com/soc-indicator/#comments Sun, 04 Jun 2023 07:41:00 +0000 https://gbhackers.com/?p=2685 What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of compromise become visible. The use of IoAs provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers are disrupted and blocked before they achieve their goal such as data thief, ransomware, […]

The post Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/soc-indicator/feed/ 2
Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System https://gbhackers.com/windows-registry-analysis-tracking-everything-you-do-on-the-system/ https://gbhackers.com/windows-registry-analysis-tracking-everything-you-do-on-the-system/#respond Sat, 03 Jun 2023 03:39:00 +0000 https://gbhackers.com/?p=9029 The purpose of this article is to provide you with a depth understanding of the Windows Registry and the Wealth of information it holds. Today most administrators and forensic analysts, the registry probably looks like the entrance to a dark. Besides Configuration information, the Windows Registry holds information regarding recently accessed files and considerable information […]

The post Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/windows-registry-analysis-tracking-everything-you-do-on-the-system/feed/ 0
Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR https://gbhackers.com/next-gen-siem-open-xdr/ https://gbhackers.com/next-gen-siem-open-xdr/#respond Wed, 07 Dec 2022 18:07:21 +0000 https://gbhackers.com/?p=63475 Security information and event management, or SIEM, was introduced some 17 years ago. It makes sense for a next-gen SIEM to emerge now, or it may already be long overdue. There is a need for a more powerful upgrade to the system that has been in place for nearly two decades. Some say that traditional […]

The post Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/next-gen-siem-open-xdr/feed/ 0
SOC Third Defense Phase – Understanding Your Organization Assets https://gbhackers.com/soc-third-defense-phase/ https://gbhackers.com/soc-third-defense-phase/#respond Sat, 07 Aug 2021 04:42:00 +0000 https://gbhackers.com/?p=27850 In our first phase, we have seen the basic defense mechanisms which were recommended in organizations. In our second phase, we have seen the understanding and the importance of the behaviors of modern-day malware to encounter. In this third phase, we are going to see the importance of understanding your organization assets to provide better […]

The post SOC Third Defense Phase – Understanding Your Organization Assets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/soc-third-defense-phase/feed/ 0